我们不仅通过利用一个操作码缓存和优化PHP配置探究了php级别的技术,而且探究了如何优化您的数据库设计来实现合理的索引编制。
We looked at techniques not only at the PHP level, by leveraging an opcode cache and optimizing the PHP configuration, but also looked at optimizing your database design for proper indexing.
人们买药时撕掉贴在包装上的一个标签,就会得到一串码,然后通过短信形式把它发送到一个计算机系统,通过这个系统可以在数据库中查询到相关信息。
People buying medicine scratch off a panel attached to the packaging. This reveals a code, which they can text to a computer system that looks it up in a database.
但是,值得牢记的是,许多IPS嗅探器使用基于特征码的检测方法,这意味着当攻击被发现的时候才能被加入到数据库中。
Worth noting, however, is that many IPS sensors use signature-based detection, meaning that attacks are added to a database as they are discovered.
当专用标记阅读器在手臂附近晃动,无线电信号就会激活微芯片传送识别码,从而调出电脑数据库中该客户信息。
If a special tag-reader is waved near the arm, a radio signal prompts the chip to transmit an identification number which is used to call up information about the wearer in a computer database.
XML是以二进制格式存储在数据库中的,文本节点被存储为utf - 8代码点。
XML is stored in the database in a binary format, and the text nodes are stored as UTF-8 code points.
在DB 29中,将XML数据包括在数据库中的惟一方法是让数据库使用UTF - 8码集。
In DB2 9, the only way to include XML data in a database was to have a UTF-8 code set for the database.
下面的伪码展示了如何从数据库中检索单个值?
The following pseudo-code demonstrates how single values can be retrieved from a database.
清单4 .test2代码,向数据库中添加星星记录。
寻找关系模式的候选码是数据库设计理论中的重要问题。
Seeking for candidate key of relation scheme is an important question in designing database theory.
通过使用X2O,你无需创建自己的数据库、构建存储过程、编写服务器端代码、甚至都不用将你的AS 3代码集成到数据服务中。
With it, you don't need to create your own database, build stored procedures, write server-side code, or even integrate your AS3 code to data services.
运用数据库基表的主码链接思想,根据供应链上各环节物流特点的不同,对各环节的物流跟踪流程进行了较为详细的分析。
Using the thoughts of chaining of primary key of the database, according to the logistics characteristics of different links on supply chain, I have analysed the tracking follow of each link.
迈克菲最近一项关于资料隐码攻击(一种用来渗透数据库的技术)的调查显示,2011年第一季度50%左右的黑客攻击都是来自中国。
A recent study by McAfee of "SQL injections", a technique used to penetrate databases, showed that around half of the reported attacks in the first quarter of 2011 originated from China.
该数据库的兼容码,是在不断演变,由最终用户使他们能测试及利率全部代码。
The database of compatible codes is continually being evolved by end users who can test and rate all the codes.
管理登陆加入验证码,数据库管理密码采用MD 5加密。
Management landing by adding a verification code, database management password using MD5 encryption.
比较的典型对象是源代码、目标(代)码、数据库文件的相似版本或测试结果。
Typical objects of comparison are similar versions of source code, object code, data base files, or test results.
文章提出使用指纹纹形、脊线数目和基于Gabor滤波的指纹特征———指纹码构建多级索引指纹数据库和在此基础上检索多级指纹数据库的方法。
This paper proposes not only index of multilevel fingerprint database that is built by fingerprint pattern, ridge count and FingerCode based on Gabor filter but also a search method of it.
图书馆管理数据库设计。如果输入的用户名和密 码正确,则可以进入主窗口。
If you enter a user name and password are correct, you can enter the main window.
图书馆管理数据库设计。如果输入的用户名和密 码正确,则可以进入主窗口。
If you enter a user name and password are correct, you can enter the main window.
应用推荐